Laptop Docks Vulnerable to Physical Hacks

Below:

Next story in Tech and gadgets

Laptop docking stations are useful for increasing a computer's
functionality — but they can also be used to launch a computer
attack.

As an interface with access to the network and all ports on a
laptop, a docking station isn't just a "dumb" device.

Hackers can exploit one by connecting it to a stealthy piece of
hardware that can be controlled remotely.

"If you have access to a dock, you have information on all the
other ports, such as softphones or videoconference traffic," NCC
security researcher Andy Davis told the Dark Reading security blog. "It [the
dock] can capture traffic before it's encrypted and after it's
decrypted."

A softphone is any kind of software product used to make
telephone calls over the Internet, such as
Skype.

Although the majority of computer attacks are perpetrated by
criminals in remote locations, who never have physical access to
a victim's hardware, it's important not to overlook the
vulnerabilities we have sitting on our desks.

Even a low-level custodial employee with office access could
quickly and covertly place such a device inside a docking
station.